The first version of IDM365 was initiated by some serious challenges faced by some of our clients. At that time we were mainly supporting these clients as security consultants. Questions that kept surfacing were about the users. The challenge was more or less divided into three main categories: One type of challenge was how to